1. Cybersecurity >
  2. Cybersecurity Nachrichten >
  3. Empfehlungen: Die NSA rät zu UEFI und Secure Boot

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

Empfehlungen: Die NSA rät zu UEFI und Secure Boot


IT Security Nachrichten vom | Direktlink: heise.de Nachrichten Bewertung

Wenn Angreifer Computer schon vor dem Windows-Start drangsalieren, hat das fatale Folgen und AV-Software ist oft machtlos. Die NSA gibt Tipps zur Absicherung....
https://www.heise.de/news/Empfehlungen-Die-NSA-raet-zu-UEFI-und-Secure-Boot-4902884.html?wt_mc=rss.red.security.security.atom.beitrag.beitrag

Externe Quelle mit kompletten Inhalt anzeigen


Zur Startseite von Team IT Security

➤ Weitere Beiträge von Team Security | IT Sicherheit

UEFI Firmware Parser - Parse BIOS/Intel ME/UEFI Firmware Related Structures: Volumes, FileSystems, Files, Etc

vom 219.69 Punkte ic_school_black_18dp
The UEFI firmware parser is a simple module and set of scripts for parsing, extracting, and recreating UEFI firmware volumes. This includes parsing modules for BIOS, OptionROM, Intel ME and other formats too. Please use the example scripts for parsing

UEFI Firmware Parser - Parse BIOS/Intel ME/UEFI Firmware Related Structures: Volumes, FileSystems, Files, Etc

vom 219.69 Punkte ic_school_black_18dp
The UEFI firmware parser is a simple module and set of scripts for parsing, extracting, and recreating UEFI firmware volumes. This includes parsing modules for BIOS, OptionROM, Intel ME and other formats too. Please use the example scripts for parsing

How and why is UEFI's Secure Boot useful?

vom 196.03 Punkte ic_school_black_18dp
There has been some discussions around SecureBoot recently, which a lot of it prompted by Intel's clearlinux team saying that they do not support Secure Boot. I wanted to clear several misconceptions on the matter. 1) Secure Boot is a microsoft produc

AhMyth-Android-RAT: Android Remote Administration Tool for Linux and Windows

vom 165.75 Punkte ic_school_black_18dp
About AhMyth-Android-RAT   AhMyth-Android-RAT consists of two parts:    * Server side: desktop application based on electron framework (control panel).    * Client side: android application (backdoor).Install and run AhMyth-Android-RAT from source code 

TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors

vom 156.63 Punkte ic_school_black_18dp
Original release date: April 27, 2017 | Last revised: May 14, 2017Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurri

USN-4432-2: GRUB2 regression

vom 151.92 Punkte ic_school_black_18dp
USN-4432-1 fixed vulnerabilities in GRUB2 affecting Secure Boot environments. Unfortunately, the update introduced regressions for some BIOS systems (either pre-UEFI or UEFI configured in Legacy mode), preventing them from successfully booting. This update

Developing for Direct Boot

vom 148.3 Punkte ic_school_black_18dp
Posted by Wojtek Kaliciński, Developer Advocate Starting with Android N, a device that has been powered on can boot into a new mode called Direct Boot before the user has a chance to unlock it for the first time. In this mode, the operating system is fully operational, but access to private app data is limited and only apps that have been updated to be Direct Boot aware ca

Developing for Direct Boot

vom 148.3 Punkte ic_school_black_18dp
Posted by Wojtek Kaliciński, Developer Advocate Starting with Android N, a device that has been powered on can boot into a new mode called Direct Boot before the user has a chance to unlock it for the first time. In this mode, the operating system is fully operational, but access to private app data is limited and only apps that have been updated to be Direct Boot aware ca

Creating a hardened Arch Linux installation with linux-hardened, Full Disk Encryption(with detached LUKS2 header), encrypted /boot on a USB, AppArmor, firejail, TCP/IP hardening

vom 146.54 Punkte ic_school_black_18dp
Please note that I'm not an expert by any means. I'm just a completely normal person who read a bunch of wiki pages and decided to help people, I'M NOT RESPONSIBLE IF ANYTHING DOESN'T WORK AS I SAID OR IF YOU END UP MESSING UP SOMETHING OR BRICKING

AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

vom 146.06 Punkte ic_school_black_18dp
Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly

NSA publishes guidance on UEFI Secure Boot customization

vom 141.63 Punkte ic_school_black_18dp
The US National Security Agency (NSA) published guidance on the Unified Extensible Firmware Interface (UEFI) Secure Boot customization. The United States National Security Agency (NSA) has published guidance on how the Unified Extensible Firmware Interface (U

Torvalds Opposes Tying UEFI Secure Boot to Kernel Lockdown Mode

vom 139.9 Punkte ic_school_black_18dp
An anonymous reader quotes Phoronix: The kernel lockdown feature further restricts access to the kernel by user-space with what can be accessed or modified... Pairing that with UEFI SecureBoot unconditionally is meeting some resistance by Linus Torvalds.

Team Security Diskussion über Empfehlungen: Die NSA rät zu UEFI und Secure Boot